Bootcamp Series Part 1: Disrupting the Attacker’s Toolkit - Before the Attack

Logo
Presented by

Joseph Salazar, Technical Deception Engineer, CISSP, CEH, EnCE

About this talk

Attackers are increasingly exploiting enterprise identities, allowing them to evade defenses, elevate privileges, acquire targets, and compromise them. Watch the boot camp webinar series to understand and learn about an attacker’s line of sight and how to protect critical assets from compromise. Part 1: Disrupting the Attacker’s Toolkit – See, Protect and Prevent • See What Attackers Can Attack – Visibility and Attack Surface Reduction Learn how to gain visibility of what an attacker sees to identity risks and entitlement exposures, then reduce the identity attack surface by remediating these exposures to limit what attackers can exploit. • Cloaking Critical Assets – Protect and Prevent Access to Assets Learn how deception and concealment technologies protect sensitive or privileged local credentials, Active Directory objects, and other production data to deny attackers opportunities for access or exploitation.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (54)
Subscribers (5277)
Attivo Networks closes the cyber security detection deficit with dynamic deception that accurately and efficiently reveals in-network threats and their lateral movement.